Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

In the intelligence community (IC), the term &quot;open&quot; refers to overt, publicly available sources (as opposed to covert or classified sources); it is not related to open-source software or public intelligence.

4.
Ethics and motives<br />“Every single scam in human history has worked for one key reason; the victim did not recognize it as a scam.”<br />- R. Paul Wilson<br />4<br />Fujitsu Edmonton Security Lab<br />

7.
Features<br />Maps relationships between numerous physical or digital objects<br />Discovers information from numerous online sources<br />Extensible: Maltego can model relationships between almost anything – add your own “entities”, write your own “transforms” and integrate to other systems with the API<br />Free Community Version (as in beer and speech) and a powerful commercial version for ~US$700 for the first year<br />7<br />Fujitsu Edmonton Security Lab<br />